CN109359486B - Encryption and decryption system and operation method thereof - Google Patents

Encryption and decryption system and operation method thereof Download PDF

Info

Publication number
CN109359486B
CN109359486B CN201811242297.7A CN201811242297A CN109359486B CN 109359486 B CN109359486 B CN 109359486B CN 201811242297 A CN201811242297 A CN 201811242297A CN 109359486 B CN109359486 B CN 109359486B
Authority
CN
China
Prior art keywords
chip
key
ciphertext
data
read
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811242297.7A
Other languages
Chinese (zh)
Other versions
CN109359486A (en
Inventor
李祎
程龙
缪向水
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huazhong University of Science and Technology
Original Assignee
Huazhong University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huazhong University of Science and Technology filed Critical Huazhong University of Science and Technology
Priority to CN201811242297.7A priority Critical patent/CN109359486B/en
Publication of CN109359486A publication Critical patent/CN109359486A/en
Priority to PCT/CN2019/095682 priority patent/WO2020082820A1/en
Application granted granted Critical
Publication of CN109359486B publication Critical patent/CN109359486B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an encryption and decryption system and an operation method thereof; the cipher key chip comprises a cipher key chip, a cipher text chip, a random number generator and a peripheral circuit, wherein the peripheral circuit consists of a controller, a read-write circuit, a signal amplifier and an address coding circuit. Before encryption, the random number generator generates a random signal to be written into the key chip. During encryption, plaintext data is written into a ciphertext chip, then the plaintext data is associated with part of unit addresses serving as keys in a key chip, and a key signal is applied to a plaintext data unit to perform encryption calculation, so that data encryption is completed. And during decryption, reading the key in the key chip, and performing decryption calculation with the ciphertext in the ciphertext chip to finish data decryption. In the whole process, the key chip is always in an off-line state. The invention takes the resistance state as the key, encrypts the plaintext data on the basis of hardware, covers the original data, stores the key off line, improves the safety of information storage and saves power consumption and time delay.

Description

Encryption and decryption system and operation method thereof
Technical Field
The invention belongs to the field of information security, and particularly relates to an encryption and decryption system and an operation method thereof.
Background
Encryption and decryption of data have important applications in the information age. The encryption process refers to encoding plaintext data by an encoding means, a method used in the encoding process is a secret key, and the encoded data is ciphertext data. The decryption process is the inverse operation of the encryption process, the ciphertext is decoded through the key, and the output is the plaintext. In the encryption and decryption processes, the key must be unique and can be repeated, otherwise, the ciphertext can be cracked easily or cannot be cracked at all, and thus the original data cannot be obtained. The key is the key to the whole encryption and decryption process, and therefore, its security determines how easy the ciphertext is to be cracked.
The traditional encryption method is designed as proposed in the invention patent of China (application number: CN108347335A) of login verification method and system based on SM3 algorithm and random challenge code, so that the international algorithms widely used at present, such as MD5, are optimized, and the number of bits of summary information and login challenge code are increased. The design is an encryption process based on a data algorithm and carried out on a software level, although the prior art is improved, the design is based on the algorithm, and is easy to monitor and further cracked; moreover, although the complicated operation steps increase the security, the whole system consumes a large amount of power consumption, operation time and storage space; in addition, the memory for storing the original data is violently cracked, and the data in the memory can be obtained by directly avoiding the encryption and decryption algorithm. Therefore, the encryption process based on the data algorithm still has the problems of low security and low energy efficiency.
Disclosure of Invention
In view of the defects of the prior art, the present invention aims to provide an encryption and decryption system and an operation method thereof, which aims to improve the problems of low security and low energy efficiency in the encryption method based on the data algorithm.
The invention provides an encryption and decryption system, comprising: the cipher key comprises a key chip, a cipher text chip, a random number generator and a peripheral circuit; the random number generator is used for randomly generating a series of binary codes according to an instruction; the peripheral circuit is connected with the key chip and the ciphertext chip and used for reading the key data in the key chip and performing logic operation on the plaintext data in the ciphertext chip to generate a ciphertext, namely, data encryption is realized.
Furthermore, the key chip and the ciphertext chip have the same structure, and both include: the device comprises a resistive cross bar array consisting of N resistive units and N transistors and an address selection circuit corresponding to the array, wherein each resistive unit in the array is connected with one transistor in series; the grid electrode of the transistor is connected with a Selection Line (SL), the source electrode of the transistor is connected with a Word Line (WL), the drain electrode of the transistor is connected with the anode of the resistance changing unit, and the cathode of the resistance changing unit is connected with a Bit Line (BL).
All the resistive units and the transistors are made of the same material and have the same parameters.
When positive voltage pulses exceeding a first threshold value are applied to the two ends of the positive electrode and the negative electrode of the resistance change unit, the resistance change unit is changed into a low resistance state; when negative voltage pulses exceeding a second threshold value are applied to the two ends of the positive electrode and the negative electrode of the resistance change unit, the resistance change unit is changed into a high resistance state; the low resistance state of the resistance change unit is recorded as a logic value 1, and the high resistance state of the resistance change unit is recorded as a logic value 0.
Further, the peripheral circuit includes: the cipher text encryption and decryption device comprises a controller, a secret key read-write circuit, a cipher text read-write circuit, a signal amplifier and an address coding circuit; a first input end of the key read-write circuit is connected to an output end of the random number generator, a second input end of the key read-write circuit is connected to a first output end of the controller, and an output end of the key read-write circuit is connected to a first input end of the key chip; the first input end of the ciphertext read-write circuit is connected to the first output end of the signal amplifier, the second input end of the ciphertext read-write circuit is connected to the second output end of the controller, and the output end of the ciphertext read-write circuit is connected to the first input end of the ciphertext chip; the first input end of the signal amplifier is connected to the output end of the key chip, and the first input end of the signal amplifier is connected to the third output end of the controller; the input end of the address coding circuit is connected to the second output end of the signal amplifier, the first output end of the address coding circuit is connected to the second input end of the key chip, and the second output end of the address coding circuit is connected to the second input end of the ciphertext chip; the controller is used for providing various operating voltages for the key read-write circuit, the ciphertext read-write circuit, the signal amplifier and the address coding circuit; the key reading and writing circuit is used for reading or writing data in the key chip; the ciphertext read-write circuit is used for reading or writing data in the ciphertext chip; the signal amplifier is used for converting the current signal read from the key chip into a voltage signal meeting the requirement; the address coding circuit is used for associating and coding the addresses of the units in the key chip and the ciphertext chip.
The invention also provides an operation method based on the encryption and decryption system, which can execute the data encryption function and comprises the following steps:
s11: generating a random pulse sequence by the random number generator, and controlling the key read-write circuit to write random data into the key chip by the controller;
s12: the controller controls the ciphertext read-write circuit to write plaintext data into the ciphertext chip;
s13: the address of plaintext data in the ciphertext chip is associated with the address of part of data in the key chip through the address coding circuit, and the part of data is a key;
s14: and reading the key data in the key chip, and performing logic operation on the plaintext data in the ciphertext chip through the signal amplifier and the ciphertext read-write circuit to generate a ciphertext, namely realizing data encryption.
Wherein the logical operation is XOR logic.
The invention also provides an operation method based on the encryption and decryption system, which can execute the data decryption function and comprises the following steps:
s21: selecting a key in the key chip corresponding to a ciphertext data address in the ciphertext chip through the address coding circuit;
s22: and reading the key data in the key chip, and performing logic operation on the ciphertext in the ciphertext chip through the signal amplifier and the ciphertext read-write circuit to generate plaintext data, namely realizing data decryption.
Wherein, the bit number of partial data in the key chip is customized by a user.
The cache region in the address coding circuit is used for storing information related to the key address in the key chip and the ciphertext address in the ciphertext chip.
Compared with the prior art, the technical scheme of the invention has the advantages that the key can be stored for a long time due to the fact that the resistance state of the device is used as the key; the safety of key storage is enhanced by the characteristics of random generation and offline key storage; on the basis of hardware, by means of an encryption and decryption mode integrating storage and logic operation, power consumption and time delay are saved, the ciphertext is prevented from being cracked violently, and the safety of information storage is improved.
Drawings
FIG. 1 is a schematic view of a current-voltage characteristic curve of a resistive switching device;
FIG. 2 is a schematic diagram of an encryption and decryption system;
FIG. 3 is a schematic structural diagram of a resistance change unit chip;
FIG. 4 is a schematic diagram of a data encryption process;
FIG. 5 is a schematic diagram of a data decryption process;
FIG. 6 is a schematic diagram of a signal amplifier circuit;
FIG. 7 is a schematic diagram of the XOR logic operation;
FIG. 8 is a diagram of the XOR logical true values;
fig. 9 shows a first embodiment of the present invention: the encryption operation schematic diagram of the data;
fig. 10 shows a second embodiment of the present invention: the operation of decrypting data is schematically shown.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Before the technical scheme of the invention is introduced, some characteristics of the resistive switching device are introduced first, and fig. 1 is a schematic view of a volt-ampere characteristic curve of a bipolar resistive switching device. As can be seen from the graph, when the forward voltage applied across the resistive switching device is greater than or equal to the first threshold, e.g., VSetThe device changes from a high resistance state to a low resistance state; when the negative voltage applied to the resistive switching device is less than or equal to a second threshold, e.g., VResetThe device changes from the low resistance state to the high resistance state.
Based on the characteristics of the resistance change device, the resistance state of the resistance change device is controlled by controlling the voltage at two ends of the resistance change device, and binary data '0' and '1' are written in through the change of the resistance state of the resistance change device. For example, when the resistance change device is low-resistance, data 1 is written; when the resistance change device is high-resistance, data 0 is written. Of course, when the resistance change device is low resistance, data 0 may be written; when the resistance change device is high-resistance, data 1 is written. In the invention, the high resistance state of the resistance change device is recorded as logic 0, and the low resistance state is recorded as logic 1.
FIG. 1 also showsGoes out of the read voltage VReadSize of (V)ReadThe voltage amplitude is far smaller than the first threshold and the second threshold, and the resistance state of the resistance change device cannot be greatly influenced.
Fig. 2 is a schematic diagram of an encryption and decryption system of the present invention, which specifically includes: the cipher key chip comprises a cipher key chip, a cipher text chip, a random number generator and a peripheral circuit, wherein the peripheral circuit consists of a controller, a cipher key read-write circuit, a cipher text read-write circuit, a signal amplifier and an address coding circuit. The output end of the random number generator is connected with the input end of the key read-write circuit, the output end of the key read-write circuit is connected with the key chip, the key chip is connected with the input end of the signal amplifier, the output end of the signal amplifier is connected with the input end of the ciphertext read-write circuit, and the output end of the ciphertext read-write circuit is connected with the ciphertext chip. The output end of the controller is connected with the input ends of the key read-write circuit, the ciphertext read-write circuit and the address coding circuit, and the output end of the address coding circuit is connected with the key chip and the ciphertext chip.
The random number generator can randomly generate a series of binary codes according to the instruction;
the controller provides various operating voltages for the read-write circuit, the signal amplifier and the address coding circuit;
the key reading and writing circuit is used for reading or writing data in the key chip;
the ciphertext read-write circuit is used for reading or writing data in the ciphertext chip;
the signal amplifier is connected with the key chip and the ciphertext read-write circuit and has the function of converting the current signal read from the key chip into a voltage signal meeting the requirement;
the address coding circuit associates and codes the addresses of the units in the key chip and the ciphertext chip.
Fig. 3 is a schematic diagram of a chip structure of a resistive switching unit, which specifically includes a resistive switching crossbar array and a corresponding on-chip address selection circuit. In the resistive cross bar array, each resistive unit is connected with a transistor in series, the grid electrode of the transistor is connected with a Selection Line (SL), the source electrode of the transistor is connected with a Word Line (WL), the drain electrode of the transistor is connected with the anode of the resistive unit, and the cathode of the resistive unit is connected with a Bit Line (BL). And the materials and parameters of all the resistance change units and the transistors are consistent.
When positive voltage pulses exceeding a first threshold value are applied to the two ends of the positive electrode and the negative electrode of the resistance change unit, the resistance change unit is changed into a low resistance state; when negative voltage pulses exceeding a second threshold value are applied to the two ends of the positive electrode and the negative electrode of the resistance change unit, the resistance change unit is changed into a high resistance state. And recording the low resistance state of the resistance change unit as a logic value 1, and recording the high resistance state of the resistance change unit as a logic value 0. The first threshold and the second threshold are intrinsic parameters of the resistive switching unit, and the thresholds corresponding to different resistive switching units are different, and after the resistive switching units are determined, a person skilled in the art can measure the thresholds according to a method provided in the prior art. Fig. 4 is a schematic diagram of an encryption operation flow based on the system structure, which specifically includes the following operation steps:
s101: the random number generator generates a binary code;
s102: writing the binary code data into the key chip;
s103: writing the plaintext data into the ciphertext chip;
s104: associating the address of the plaintext data in the ciphertext chip with the address of the user-defined data in the key chip; the part of data defined by the user is the key data;
s105: carrying out XOR logical operation on the key data in the key chip and the plaintext data in the ciphertext chip;
s106: and finishing data encryption after all data are calculated.
Fig. 5 is a schematic diagram of a decryption operation flow based on the system structure, which specifically includes the following operation steps:
s201: reading key data in the key chip;
s202: carrying out XOR logical operation on the key data and the ciphertext data in the ciphertext chip;
s203: and finishing the data decryption after all the data are calculated.
Fig. 6 is a schematic diagram of a signal amplifier. The result of reading part of the data from the key chip is represented by the current IINIs input and can be obtained according to circuit knowledgeVOUT=IINThe resistance values of R and R are far larger than the low resistance state of the resistive device, and the specific resistance values can be determined according to actual conditions.
When the data stored in the unit in the key chip is 1, the unit is in a low resistance state, the read current is large, and therefore VOUTThe high level is marked as logic 1; when the data stored in the unit in the key chip is 0, the unit is in a high-impedance state, the read current is small, and therefore V isOUTThe low level is marked as logic 0; in summary, the signal amplifier converts the current input into a corresponding voltage output;
FIG. 7 is a schematic diagram of the XOR logic operation. For convenience of description, the key data in the key chip is p, and the plaintext data/ciphertext data in the ciphertext chip is q. For the resistance change unit, p and q variables are expressed in the form of resistance states; for the ports of the transistor gate, source and resistive cell cathode, the p and q variables are represented in the form of voltages.
When the data in the ciphertext chip is 0, namely q is 0, if p is 0, the gate voltage is less than the transistor starting voltage, the transistor is pinched off, the resistance state of the resistance change unit cannot be changed, and the calculation result is 0; if p is 1, the gate voltage is greater than the transistor turn-on voltage, the transistor is turned on, and at this time, the positive electrode of the resistive switching unit is at a high level and the negative electrode of the resistive switching unit is at a low level, so that the resistive switching unit is in a low resistance state, and the calculation result is 1. When the data in the chip B is 1, that is, q is equal to 1, if p is equal to 0, the gate voltage is less than the transistor turn-on voltage, the transistor is pinched off, the resistance state of the resistance change unit does not change, and the calculation result is 1; if p is 1, the gate voltage is greater than the transistor starting voltage, the transistor is turned on, at this time, the positive electrode of the resistive switching unit is at a low level, the negative electrode of the resistive switching unit is at a high level, so that the resistive switching unit is in a high-resistance state, and the calculation result is 0;
FIG. 8 is a diagram of the XOR logical true values;
fig. 9 shows a first embodiment of the present invention: the encryption operation of data is schematically shown. The random number generator generates a binary code of "10101001" and has been written into the key chip. The plaintext '01011010' has been written in the ciphertext chip. The user selects the first 4 bits of data in the key chip as a key, and associates the address of the 8 bits of data in the ciphertext chip with the address of the key data in the key chip, namely the key data in the key chip is '1010'.
During encryption, firstly, XOR logical operation is carried out on the key '1010' and the previous 4-bit data '0101' in the ciphertext chip, the calculation result is '1111', plaintext data are covered, and the plaintext data are directly stored in the ciphertext chip; then, XOR logical operation is carried out on the key '1010' and the later 4-bit data '1010' in the ciphertext chip, the calculation result is '0000', and plaintext data are covered and directly stored in the ciphertext chip. The '11110000' is the cipher text, and the encryption process is finished;
fig. 10 shows a second embodiment of the present invention: the operation of decrypting data is schematically shown. The address coding circuit firstly determines the key address corresponding to the ciphertext '11110000' in the ciphertext chip to obtain the key '1010'.
During decryption, firstly, XOR logical operation is carried out on the key '1010' and the first 4-bit data '1111' in the ciphertext chip, the calculation result is '0101', the ciphertext data are covered, and the ciphertext data are directly stored in the ciphertext chip; then, XOR logical operation is carried out on the key '1010' and the later 4-bit data '0000' in the ciphertext chip, the calculation result is '1010', and the ciphertext data is covered and directly stored in the ciphertext chip. 01011010 is the plaintext, and the decryption process is completed.
It will be understood by those skilled in the art that the foregoing is only a preferred embodiment of the present invention, and is not intended to limit the invention, and that any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (8)

1. An encryption and decryption system, comprising: the cipher key comprises a key chip, a cipher text chip, a random number generator and a peripheral circuit;
the random number generator is used for randomly generating a series of binary codes according to an instruction, and the binary codes are written into the key chip;
the key chip and the ciphertext chip have the same structure and both comprise: the device comprises a resistive cross bar array consisting of N resistive units and N transistors and an address selection circuit corresponding to the array, wherein each resistive unit in the array is connected with one transistor in series; the grid electrode of the transistor is connected with the selection line, the source electrode of the transistor is connected with the word line, the drain electrode of the transistor is connected with the anode of the resistance change unit, and the cathode of the resistance change unit is connected with the bit line;
the peripheral circuit is connected with the key chip and the ciphertext chip and is used for reading the key data p in the key chip, converting the key data p into corresponding voltage after reading the key data p and applying the corresponding voltage to the transistor grid of the ciphertext chip; reading the ciphertext/plaintext data q in the ciphertext chip, converting the ciphertext/plaintext data q into corresponding voltage after reading the ciphertext/plaintext data q, applying the voltage to the negative electrode of the resistance change unit of the ciphertext chip, and performing data conversion on the ciphertext/plaintext data q to obtain a data output
Figure FDA0002963288650000011
Converting the voltage into corresponding voltage, and applying the voltage to a source electrode of the ciphertext chip transistor;
the peripheral circuit comprises a signal amplifier which is used for converting the current signal read in the key chip into a voltage signal which meets the requirement.
2. The encryption and decryption system of claim 1, wherein the resistive elements, the transistors and the materials and parameters are the same.
3. The encryption and decryption system of claim 1, wherein the resistive switching element changes to a low resistance state when a positive voltage pulse exceeding a first threshold is applied across a positive and a negative terminal of the resistive switching element; when negative voltage pulses exceeding a second threshold value are applied to the two ends of the positive electrode and the negative electrode of the resistance change unit, the resistance change unit is changed into a high resistance state; the low resistance state of the resistance change unit is recorded as a logic value 1, and the high resistance state of the resistance change unit is recorded as a logic value 0.
4. The encryption and decryption system of any of claims 1-3, wherein the peripheral circuit further comprises: the device comprises a controller, a key read-write circuit, a ciphertext read-write circuit and an address coding circuit;
a first input end of the key read-write circuit is connected to an output end of the random number generator, a second input end of the key read-write circuit is connected to a first output end of the controller, and an output end of the key read-write circuit is connected to a first input end of the key chip;
the first input end of the ciphertext read-write circuit is connected to the first output end of the signal amplifier, the second input end of the ciphertext read-write circuit is connected to the second output end of the controller, and the output end of the ciphertext read-write circuit is connected to the first input end of the ciphertext chip;
the first input end of the signal amplifier is connected to the output end of the key chip, and the first input end of the signal amplifier is connected to the third output end of the controller;
the input end of the address coding circuit is connected to the second output end of the signal amplifier, the first output end of the address coding circuit is connected to the second input end of the key chip, and the second output end of the address coding circuit is connected to the second input end of the ciphertext chip;
the controller is used for providing various operating voltages for the key read-write circuit, the ciphertext read-write circuit, the signal amplifier and the address coding circuit;
the key reading and writing circuit is used for reading or writing data in the key chip;
the ciphertext read-write circuit is used for reading or writing data in the ciphertext chip;
the address coding circuit is used for associating and coding the addresses of the units in the key chip and the ciphertext chip.
5. A method of operating an encryption and decryption system according to claim 4, wherein the data encryption function is performed, comprising the steps of:
s11: generating a random pulse sequence by the random number generator, and controlling the key read-write circuit to write random data into the key chip by the controller;
s12: the controller controls the ciphertext read-write circuit to write plaintext data into the ciphertext chip;
s13: the address of plaintext data in the ciphertext chip is associated with the address of part of data in the key chip through the address coding circuit, and the part of data is a key;
s14: and reading the key data p in the key chip, and carrying out XOR logical operation on the plaintext data in the ciphertext chip through the signal amplifier and the ciphertext read-write circuit to generate a ciphertext, namely realizing data encryption.
6. A method of operating an encryption and decryption system according to claim 4, wherein the data decryption function is performed, comprising the steps of:
s21: selecting a key in the key chip corresponding to a ciphertext data address in the ciphertext chip through the address coding circuit;
s22: and reading the key data p in the key chip, and carrying out XOR logical operation on the ciphertext in the ciphertext chip through the signal amplifier and the ciphertext read-write circuit to generate plaintext data, namely realizing data decryption.
7. A method of operation as claimed in claim 5 or 6, wherein the number of bits of the partial data in the key chip is user-defined.
8. The method of claim 7, wherein a buffer in the address encoding circuit is configured to store information that associates a key address in the key chip and a ciphertext address in the ciphertext chip.
CN201811242297.7A 2018-10-24 2018-10-24 Encryption and decryption system and operation method thereof Active CN109359486B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201811242297.7A CN109359486B (en) 2018-10-24 2018-10-24 Encryption and decryption system and operation method thereof
PCT/CN2019/095682 WO2020082820A1 (en) 2018-10-24 2019-07-12 Encryption and decryption system and operation method therefor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811242297.7A CN109359486B (en) 2018-10-24 2018-10-24 Encryption and decryption system and operation method thereof

Publications (2)

Publication Number Publication Date
CN109359486A CN109359486A (en) 2019-02-19
CN109359486B true CN109359486B (en) 2021-07-27

Family

ID=65346489

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811242297.7A Active CN109359486B (en) 2018-10-24 2018-10-24 Encryption and decryption system and operation method thereof

Country Status (2)

Country Link
CN (1) CN109359486B (en)
WO (1) WO2020082820A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109359486B (en) * 2018-10-24 2021-07-27 华中科技大学 Encryption and decryption system and operation method thereof
CN110298181A (en) * 2019-05-14 2019-10-01 北京航空航天大学 Data encryption storage method, data decryption method and encrypted memory chip
CN110989972B (en) * 2019-12-05 2021-11-30 清华大学 Random number generation method and random number generator
CN113158203B (en) * 2021-04-01 2024-05-17 深圳市纽创信安科技开发有限公司 SOC chip, circuit and external data read-write method of SOC chip

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104516834A (en) * 2013-09-26 2015-04-15 英特尔公司 Data storage in persistent memory
CN105518786A (en) * 2013-09-09 2016-04-20 高通股份有限公司 Physically unclonable function based on resistivity of magnetoresistive random-access memory magnetic tunnel junctions
EP3319265A1 (en) * 2016-11-08 2018-05-09 Honeywell International Inc. Configuration based cryptographic key generation

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101369748B1 (en) * 2006-12-04 2014-03-06 삼성전자주식회사 Method for encrypting datas and appatus therefor
CN101001142A (en) * 2007-01-17 2007-07-18 张建华 Encipher-decipher method based on iterative random number generator
CN106656475B (en) * 2017-01-09 2020-01-21 李朋林 Novel symmetric key encryption method for high-speed encryption
CN109359486B (en) * 2018-10-24 2021-07-27 华中科技大学 Encryption and decryption system and operation method thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105518786A (en) * 2013-09-09 2016-04-20 高通股份有限公司 Physically unclonable function based on resistivity of magnetoresistive random-access memory magnetic tunnel junctions
CN104516834A (en) * 2013-09-26 2015-04-15 英特尔公司 Data storage in persistent memory
EP3319265A1 (en) * 2016-11-08 2018-05-09 Honeywell International Inc. Configuration based cryptographic key generation

Also Published As

Publication number Publication date
CN109359486A (en) 2019-02-19
WO2020082820A1 (en) 2020-04-30

Similar Documents

Publication Publication Date Title
CN109359486B (en) Encryption and decryption system and operation method thereof
US9529570B2 (en) Random number generation using pulsed programming parameters
US9921975B2 (en) Cryptographic processing device having a non-volatile memory including memory cells in an initial or a variable state
CN109994139A (en) A kind of complete non-volatile logic implementation method and its application based on unipolarity memristor
CN108733325B (en) Data self-destruction method and system based on non-volatile memory
CN111581675A (en) Physical unclonable function circuit structure based on resistive random access memory
Korenda et al. A secret key generation scheme for internet of things using ternary-states ReRAM-based physical unclonable functions
CN110324141B (en) Physical unclonable function against side channel attacks and corresponding method
CN107368755B (en) Circuit and its security architecture design method, device, equipment and storage medium
CN115858235B (en) Cyclic redundancy check processing method and device, circuit, electronic equipment and medium
Xie et al. AIM: Fast and energy-efficient AES in-memory implementation for emerging non-volatile main memory
Liu et al. Categorization of multilevel-cell storage-class memory: an RRAM example
CN103631732B (en) Nonvolatile storage and electronic equipment
KR20190135100A (en) Physically unclonable funtion device used to user authentication system and operation method thereof
Zorgui et al. Non-stationary polar codes for resistive memories
Kannan et al. Secure memristor-based main memory
KR102246513B1 (en) Randum number generator with physical unclonable function
Majumder et al. Sneak path enabled authentication for memristive crossbar memories
WO2015140365A1 (en) Method and device for generating identifiers and truly random numbers
US20230297268A1 (en) Processing data in-memory with memory devices having a crossbar array structure
Nili et al. Highly-secure physically unclonable cryptographic primitives using nonlinear conductance and analog state tuning in memristive crossbar arrays
Chee et al. Explicit constructions of finite-length WOM codes
US20200401534A1 (en) Storage class memory with in-memory one-time pad security
Mohammadinodoushan Hardware implementation of keyless encryption scheme for Internet of Things based on image of memristors
Zhang et al. Pin tumbler lock: A shift based encryption mechanism for racetrack memory

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant